paint-brush
Elliptic Curve Cryptography: A Deep-Dive into its Building Blocks, Implementation, and Drawbacksby@fearsomelamb789
320 reads
320 reads

Elliptic Curve Cryptography: A Deep-Dive into its Building Blocks, Implementation, and Drawbacks

by FearsomeLamb7897mMarch 6th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Elliptic Curve Cryptography (ECC) is used to secure, among others, the cloudflare servers that host most on the online content nowadays. This algorithm is in charge of securing everything from customer’s HTTPS connections to data transmissions from one data center to another. It might be worth digging into why it is so important in the modern world and see how it works behind the scenes. The building blocks of ECC are the RSA algorithm and the Diffie-Hellman key exchange algorithms.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Elliptic Curve Cryptography: A Deep-Dive into its Building Blocks, Implementation, and Drawbacks
FearsomeLamb789 HackerNoon profile picture
FearsomeLamb789

FearsomeLamb789

@fearsomelamb789

Polymath keyboard ape

Learn More
LEARN MORE ABOUT @FEARSOMELAMB789'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

FearsomeLamb789 HackerNoon profile picture
FearsomeLamb789@fearsomelamb789
Polymath keyboard ape

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite